xref: /qemu/target/hppa/int_helper.c (revision e3404e01)
1 /*
2  *  HPPA interrupt helper routines
3  *
4  *  Copyright (c) 2017 Richard Henderson
5  *
6  * This library is free software; you can redistribute it and/or
7  * modify it under the terms of the GNU Lesser General Public
8  * License as published by the Free Software Foundation; either
9  * version 2.1 of the License, or (at your option) any later version.
10  *
11  * This library is distributed in the hope that it will be useful,
12  * but WITHOUT ANY WARRANTY; without even the implied warranty of
13  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14  * Lesser General Public License for more details.
15  *
16  * You should have received a copy of the GNU Lesser General Public
17  * License along with this library; if not, see <http://www.gnu.org/licenses/>.
18  */
19 
20 #include "qemu/osdep.h"
21 #include "qemu/main-loop.h"
22 #include "qemu/log.h"
23 #include "cpu.h"
24 #include "exec/helper-proto.h"
25 #include "hw/core/cpu.h"
26 #include "hw/hppa/hppa_hardware.h"
27 
28 static void eval_interrupt(HPPACPU *cpu)
29 {
30     CPUState *cs = CPU(cpu);
31     if (cpu->env.cr[CR_EIRR]) {
32         cpu_interrupt(cs, CPU_INTERRUPT_HARD);
33     } else {
34         cpu_reset_interrupt(cs, CPU_INTERRUPT_HARD);
35     }
36 }
37 
38 /* Each CPU has a word mapped into the GSC bus.  Anything on the GSC bus
39  * can write to this word to raise an external interrupt on the target CPU.
40  * This includes the system controller (DINO) for regular devices, or
41  * another CPU for SMP interprocessor interrupts.
42  */
43 static uint64_t io_eir_read(void *opaque, hwaddr addr, unsigned size)
44 {
45     HPPACPU *cpu = opaque;
46 
47     /* ??? What does a read of this register over the GSC bus do?  */
48     return cpu->env.cr[CR_EIRR];
49 }
50 
51 static void io_eir_write(void *opaque, hwaddr addr,
52                          uint64_t data, unsigned size)
53 {
54     HPPACPU *cpu = opaque;
55     CPUHPPAState *env = &cpu->env;
56     int widthm1 = 31;
57     int le_bit;
58 
59     /* The default PSW.W controls the width of EIRR. */
60     if (hppa_is_pa20(env) && env->cr[CR_PSW_DEFAULT] & PDC_PSW_WIDE_BIT) {
61         widthm1 = 63;
62     }
63     le_bit = ~data & widthm1;
64 
65     env->cr[CR_EIRR] |= 1ull << le_bit;
66     eval_interrupt(cpu);
67 }
68 
69 const MemoryRegionOps hppa_io_eir_ops = {
70     .read = io_eir_read,
71     .write = io_eir_write,
72     .valid.min_access_size = 4,
73     .valid.max_access_size = 4,
74     .impl.min_access_size = 4,
75     .impl.max_access_size = 4,
76 };
77 
78 void hppa_cpu_alarm_timer(void *opaque)
79 {
80     /* Raise interrupt 0.  */
81     io_eir_write(opaque, 0, 0, 4);
82 }
83 
84 void HELPER(write_eirr)(CPUHPPAState *env, target_ulong val)
85 {
86     env->cr[CR_EIRR] &= ~val;
87     bql_lock();
88     eval_interrupt(env_archcpu(env));
89     bql_unlock();
90 }
91 
92 void hppa_cpu_do_interrupt(CPUState *cs)
93 {
94     HPPACPU *cpu = HPPA_CPU(cs);
95     CPUHPPAState *env = &cpu->env;
96     int i = cs->exception_index;
97     uint64_t old_psw;
98 
99     /* As documented in pa2.0 -- interruption handling.  */
100     /* step 1 */
101     env->cr[CR_IPSW] = old_psw = cpu_hppa_get_psw(env);
102 
103     /* step 2 -- Note PSW_W is masked out again for pa1.x */
104     cpu_hppa_put_psw(env,
105                      (env->cr[CR_PSW_DEFAULT] & PDC_PSW_WIDE_BIT ? PSW_W : 0) |
106                      (i == EXCP_HPMC ? PSW_M : 0));
107 
108     /* step 3 */
109     /*
110      * For pa1.x, IIASQ is simply a copy of IASQ.
111      * For pa2.0, IIASQ is the top bits of the virtual address,
112      *            or zero if translation is disabled.
113      */
114     if (!hppa_is_pa20(env)) {
115         env->cr[CR_IIASQ] = env->iasq_f >> 32;
116         env->cr_back[0] = env->iasq_b >> 32;
117     } else if (old_psw & PSW_C) {
118         env->cr[CR_IIASQ] =
119             hppa_form_gva_psw(old_psw, env->iasq_f, env->iaoq_f) >> 32;
120         env->cr_back[0] =
121             hppa_form_gva_psw(old_psw, env->iasq_b, env->iaoq_b) >> 32;
122     } else {
123         env->cr[CR_IIASQ] = 0;
124         env->cr_back[0] = 0;
125     }
126     env->cr[CR_IIAOQ] = env->iaoq_f;
127     env->cr_back[1] = env->iaoq_b;
128 
129     if (old_psw & PSW_Q) {
130         /* step 5 */
131         /* ISR and IOR will be set elsewhere.  */
132         switch (i) {
133         case EXCP_ILL:
134         case EXCP_BREAK:
135         case EXCP_PRIV_REG:
136         case EXCP_PRIV_OPR:
137             /* IIR set via translate.c.  */
138             break;
139 
140         case EXCP_OVERFLOW:
141         case EXCP_COND:
142         case EXCP_ASSIST:
143         case EXCP_DTLB_MISS:
144         case EXCP_NA_ITLB_MISS:
145         case EXCP_NA_DTLB_MISS:
146         case EXCP_DMAR:
147         case EXCP_DMPI:
148         case EXCP_UNALIGN:
149         case EXCP_DMP:
150         case EXCP_DMB:
151         case EXCP_TLB_DIRTY:
152         case EXCP_PAGE_REF:
153         case EXCP_ASSIST_EMU:
154             {
155                 /* Avoid reading directly from the virtual address, lest we
156                    raise another exception from some sort of TLB issue.  */
157                 /* ??? An alternate fool-proof method would be to store the
158                    instruction data into the unwind info.  That's probably
159                    a bit too much in the way of extra storage required.  */
160                 vaddr vaddr = env->iaoq_f & -4;
161                 hwaddr paddr = vaddr;
162 
163                 if (old_psw & PSW_C) {
164                     int prot, t;
165 
166                     vaddr = hppa_form_gva_psw(old_psw, env->iasq_f, vaddr);
167                     t = hppa_get_physical_address(env, vaddr, MMU_KERNEL_IDX,
168                                                   0, &paddr, &prot, NULL);
169                     if (t >= 0) {
170                         /* We can't re-load the instruction.  */
171                         env->cr[CR_IIR] = 0;
172                         break;
173                     }
174                 }
175                 env->cr[CR_IIR] = ldl_phys(cs->as, paddr);
176             }
177             break;
178 
179         default:
180             /* Other exceptions do not set IIR.  */
181             break;
182         }
183 
184         /* step 6 */
185         env->shadow[0] = env->gr[1];
186         env->shadow[1] = env->gr[8];
187         env->shadow[2] = env->gr[9];
188         env->shadow[3] = env->gr[16];
189         env->shadow[4] = env->gr[17];
190         env->shadow[5] = env->gr[24];
191         env->shadow[6] = env->gr[25];
192     }
193 
194     /* step 7 */
195     if (i == EXCP_TOC) {
196         env->iaoq_f = hppa_form_gva(env, 0, FIRMWARE_START);
197         /* help SeaBIOS and provide iaoq_b and iasq_back in shadow regs */
198         env->gr[24] = env->cr_back[0];
199         env->gr[25] = env->cr_back[1];
200     } else {
201         env->iaoq_f = hppa_form_gva(env, 0, env->cr[CR_IVA] + 32 * i);
202     }
203     env->iaoq_b = hppa_form_gva(env, 0, env->iaoq_f + 4);
204     env->iasq_f = 0;
205     env->iasq_b = 0;
206 
207     if (qemu_loglevel_mask(CPU_LOG_INT)) {
208         static const char * const names[] = {
209             [EXCP_HPMC]          = "high priority machine check",
210             [EXCP_POWER_FAIL]    = "power fail interrupt",
211             [EXCP_RC]            = "recovery counter trap",
212             [EXCP_EXT_INTERRUPT] = "external interrupt",
213             [EXCP_LPMC]          = "low priority machine check",
214             [EXCP_ITLB_MISS]     = "instruction tlb miss fault",
215             [EXCP_IMP]           = "instruction memory protection trap",
216             [EXCP_ILL]           = "illegal instruction trap",
217             [EXCP_BREAK]         = "break instruction trap",
218             [EXCP_PRIV_OPR]      = "privileged operation trap",
219             [EXCP_PRIV_REG]      = "privileged register trap",
220             [EXCP_OVERFLOW]      = "overflow trap",
221             [EXCP_COND]          = "conditional trap",
222             [EXCP_ASSIST]        = "assist exception trap",
223             [EXCP_DTLB_MISS]     = "data tlb miss fault",
224             [EXCP_NA_ITLB_MISS]  = "non-access instruction tlb miss",
225             [EXCP_NA_DTLB_MISS]  = "non-access data tlb miss",
226             [EXCP_DMP]           = "data memory protection trap",
227             [EXCP_DMB]           = "data memory break trap",
228             [EXCP_TLB_DIRTY]     = "tlb dirty bit trap",
229             [EXCP_PAGE_REF]      = "page reference trap",
230             [EXCP_ASSIST_EMU]    = "assist emulation trap",
231             [EXCP_HPT]           = "high-privilege transfer trap",
232             [EXCP_LPT]           = "low-privilege transfer trap",
233             [EXCP_TB]            = "taken branch trap",
234             [EXCP_DMAR]          = "data memory access rights trap",
235             [EXCP_DMPI]          = "data memory protection id trap",
236             [EXCP_UNALIGN]       = "unaligned data reference trap",
237             [EXCP_PER_INTERRUPT] = "performance monitor interrupt",
238             [EXCP_SYSCALL]       = "syscall",
239             [EXCP_SYSCALL_LWS]   = "syscall-lws",
240             [EXCP_TOC]           = "TOC (transfer of control)",
241         };
242         static int count;
243         const char *name = NULL;
244         char unknown[16];
245 
246         if (i >= 0 && i < ARRAY_SIZE(names)) {
247             name = names[i];
248         }
249         if (!name) {
250             snprintf(unknown, sizeof(unknown), "unknown %d", i);
251             name = unknown;
252         }
253         qemu_log("INT %6d: %s @ " TARGET_FMT_lx ":" TARGET_FMT_lx
254                  " for " TARGET_FMT_lx ":" TARGET_FMT_lx "\n",
255                  ++count, name, env->cr[CR_IIASQ], env->cr[CR_IIAOQ],
256                  env->cr[CR_ISR], env->cr[CR_IOR]);
257     }
258     cs->exception_index = -1;
259 }
260 
261 bool hppa_cpu_exec_interrupt(CPUState *cs, int interrupt_request)
262 {
263     HPPACPU *cpu = HPPA_CPU(cs);
264     CPUHPPAState *env = &cpu->env;
265 
266     if (interrupt_request & CPU_INTERRUPT_NMI) {
267         /* Raise TOC (NMI) interrupt */
268         cpu_reset_interrupt(cs, CPU_INTERRUPT_NMI);
269         cs->exception_index = EXCP_TOC;
270         hppa_cpu_do_interrupt(cs);
271         return true;
272     }
273 
274     /* If interrupts are requested and enabled, raise them.  */
275     if ((interrupt_request & CPU_INTERRUPT_HARD)
276         && (env->psw & PSW_I)
277         && (env->cr[CR_EIRR] & env->cr[CR_EIEM])) {
278         cs->exception_index = EXCP_EXT_INTERRUPT;
279         hppa_cpu_do_interrupt(cs);
280         return true;
281     }
282     return false;
283 }
284